[LWN Logo]
[LWN.net]
From:	 bugzilla@redhat.com
To:	 redhat-watch-list@redhat.com
Subject: [RHBA-2001:082-05] New version of GCC 2.96-RH available fixing several bugs
Date:	 Fri, 22 Jun 2001 13:16 -0400

---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Bug Fix Advisory

Synopsis:          New version of GCC 2.96-RH available fixing several bugs
Advisory ID:       RHBA-2001:082-05
Issue date:        2001-06-14
Updated on:        2001-06-22
Product:           Red Hat Linux
Keywords:          gcc 2.96-RH compiler C C++ Fortran
Cross references:  
Obsoletes:         RHBA-2000:132-05
---------------------------------------------------------------------

1. Topic:

Several bugs have been found and fixed in the GNU Compiler Collection
snapshot which shipped with Red Hat Linux 7.1, and the last errata GCC 
version available for Red Hat Linux 7.0.

2. Relevant releases/architectures:

Red Hat Linux 7.0 - alpha, i386

Red Hat Linux 7.1 - i386

3. Problem description:

This update fixes several Internal Compiler Errors on invalid input as well
as some on valid input. It also fixes a number of cases where code was 
miscompiled.

See the bug IDs and package changelog for more details.

The bug IDs below are those fixed against gcc-2.96-81 which was shipped
in the Red Hat Linux 7.1 / x86 release. You may use the "--changelog" RPM 
option with the GCC RPM to see a list of changes fixed since other 
gcc-2.96-RH releases.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

31168 - gcc crashes with: Internal error: Segmentation fault.
32801 - gdb ia64 Dwarf Error: Could not find abbrev number 14672
33354 - gcc ia64 short data segment overflowed (0x4001e8 >= 0x400000)
35122 - tf history behaves differently when compiled with gcc-2.96
35963 - gcc does not understand -traditional-cpp, reports installation problem
36986 - Tree check error in gcc
37054 - GCC optimizer bug; miscompiles kernel sym53c8xx driver
37697 - -MD flag can't be used when the output file hasn't got a '.' in the name
37698 - optimization compilation error, causing unaligned execptions in the kernel
37933 - incompatibility when C++ code is dynamically loaded into a process that is not a C++ program and subsequently throws an exception
38466 - g++ segfaults when compiling with -O2
38551 - Internal error in collect_expansion, at tradcpp.c:2844
39812 - gcc omits compilation of large inline virtual member function
39824 - gcc generates call to non-existent runtime function

6. RPMs required:

Red Hat Linux 7.0:

SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/gcc-2.96-85.src.rpm

alpha:
ftp://updates.redhat.com/7.0/en/os/alpha/gcc-2.96-85.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/cpp-2.96-85.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/gcc-c++-2.96-85.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/libstdc++-2.96-85.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/libstdc++-devel-2.96-85.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/gcc-objc-2.96-85.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/gcc-g77-2.96-85.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/gcc-chill-2.96-85.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/gcc-java-2.96-85.alpha.rpm

i386:
ftp://updates.redhat.com/7.0/en/os/i386/gcc-2.96-85.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/cpp-2.96-85.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/gcc-c++-2.96-85.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/libstdc++-2.96-85.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/libstdc++-devel-2.96-85.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/gcc-objc-2.96-85.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/gcc-g77-2.96-85.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/gcc-chill-2.96-85.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/gcc-java-2.96-85.i386.rpm

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/gcc-2.96-85.src.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/gcc-2.96-85.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/cpp-2.96-85.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/gcc-c++-2.96-85.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/libstdc++-2.96-85.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/libstdc++-devel-2.96-85.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/gcc-objc-2.96-85.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/gcc-g77-2.96-85.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/gcc-chill-2.96-85.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/gcc-java-2.96-85.i386.rpm


7. Verification:

MD5 sum                           Package Name
--------------------------------------------------------------------------
026707a55141aa98b40c1fbd68f03a46 7.0/en/os/SRPMS/gcc-2.96-85.src.rpm
a7b3292fe2dda08293b4f9a5bc3f4426 7.0/en/os/alpha/cpp-2.96-85.alpha.rpm
f38e3091d0a090b9a8f1c18d73fd42d9 7.0/en/os/alpha/gcc-2.96-85.alpha.rpm
e192d76097467e9771cbab55a5fb226e 7.0/en/os/alpha/gcc-c++-2.96-85.alpha.rpm
b48f75b6416fbed0d7435e357d8bdec2 7.0/en/os/alpha/gcc-chill-2.96-85.alpha.rpm
71ba7683a5ac5a3b8da85f684fadbf43 7.0/en/os/alpha/gcc-g77-2.96-85.alpha.rpm
838fea57fb11ec3a8a3cc831d07c3f68 7.0/en/os/alpha/gcc-java-2.96-85.alpha.rpm
8c73041229dfa394409294c87a79d8c9 7.0/en/os/alpha/gcc-objc-2.96-85.alpha.rpm
b1b94bc740236d23d7535f7ad80193fa 7.0/en/os/alpha/libstdc++-2.96-85.alpha.rpm
9bcb61d8b5a4fecff76191650cbff865 7.0/en/os/alpha/libstdc++-devel-2.96-85.alpha.rpm
f8d2233e7e87ca7899e4211e799f682f 7.0/en/os/i386/cpp-2.96-85.i386.rpm
34f19fcb632adaa47fba7002ed4d388f 7.0/en/os/i386/gcc-2.96-85.i386.rpm
e75398f23515a6aa06814dc1044f2fff 7.0/en/os/i386/gcc-c++-2.96-85.i386.rpm
a84f66c27dce780eaa46761c26fb5810 7.0/en/os/i386/gcc-chill-2.96-85.i386.rpm
6ce7959fb9dc00514165bd3ddc6a26f6 7.0/en/os/i386/gcc-g77-2.96-85.i386.rpm
6c9d02c5c0a643716ab5f84dc57357c4 7.0/en/os/i386/gcc-java-2.96-85.i386.rpm
71f54d3be2841630e307eebe44d3459e 7.0/en/os/i386/gcc-objc-2.96-85.i386.rpm
c55761de27efcd655352d983b63b71a4 7.0/en/os/i386/libstdc++-2.96-85.i386.rpm
83f4b62697604e7ae9790a9aba9d5296 7.0/en/os/i386/libstdc++-devel-2.96-85.i386.rpm
026707a55141aa98b40c1fbd68f03a46 7.1/en/os/SRPMS/gcc-2.96-85.src.rpm
f8d2233e7e87ca7899e4211e799f682f 7.1/en/os/i386/cpp-2.96-85.i386.rpm
34f19fcb632adaa47fba7002ed4d388f 7.1/en/os/i386/gcc-2.96-85.i386.rpm
e75398f23515a6aa06814dc1044f2fff 7.1/en/os/i386/gcc-c++-2.96-85.i386.rpm
a84f66c27dce780eaa46761c26fb5810 7.1/en/os/i386/gcc-chill-2.96-85.i386.rpm
6ce7959fb9dc00514165bd3ddc6a26f6 7.1/en/os/i386/gcc-g77-2.96-85.i386.rpm
6c9d02c5c0a643716ab5f84dc57357c4 7.1/en/os/i386/gcc-java-2.96-85.i386.rpm
71f54d3be2841630e307eebe44d3459e 7.1/en/os/i386/gcc-objc-2.96-85.i386.rpm
c55761de27efcd655352d983b63b71a4 7.1/en/os/i386/libstdc++-2.96-85.i386.rpm
83f4b62697604e7ae9790a9aba9d5296 7.1/en/os/i386/libstdc++-devel-2.96-85.i386.rpm

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

8. References:




Copyright(c) 2000, 2001 Red Hat, Inc.



_______________________________________________
Redhat-watch-list mailing list
To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list